{"id":89550,"date":"2026-05-15T12:55:21","date_gmt":"2026-05-15T11:55:21","guid":{"rendered":"https:\/\/www.wallix.com\/wie-sich-ein-ransomware-eindringen-in-eine-nationale-krise-verwandelte\/"},"modified":"2026-05-15T13:02:50","modified_gmt":"2026-05-15T12:02:50","slug":"wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/","title":{"rendered":"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten"},"content":{"rendered":"<div class='flex_column_table av-m4gycypq-fb9e468fe802133cd1178d4038e45437 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gycypq-fb9e468fe802133cd1178d4038e45437\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\npadding:0 0 0 0;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4gycypq-fb9e468fe802133cd1178d4038e45437 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mp6utlkh-c4f1e497504e9ef44a129729c9ebab15\">\n.avia-image-container.av-mp6utlkh-c4f1e497504e9ef44a129729c9ebab15 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-mp6utlkh-c4f1e497504e9ef44a129729c9ebab15 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-mp6utlkh-c4f1e497504e9ef44a129729c9ebab15 av-styling- av-img-linked avia-align-center  avia-builder-el-1  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE.pdf\" class='avia_image '  aria-label='WALLIX_INFOGRAPHIC_EU Cyberattack Case_DE'><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-89551 avia-img-lazy-loading-not-89551 avia_image ' src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-scaled.png\" alt='' title='WALLIX_INFOGRAPHIC_EU Cyberattack Case_DE'  height=\"2560\" width=\"1810\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-scaled.png 1810w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-212x300.png 212w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-728x1030.png 728w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-768x1086.png 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-1086x1536.png 1086w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-1448x2048.png 1448w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-1060x1500.png 1060w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE-498x705.png 498w\" sizes=\"(max-width: 1810px) 100vw, 1810px\" \/><\/a><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409\">\n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409 av_one_third  avia-builder-el-2  el_after_av_two_third  el_before_av_two_third  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-eggfj0-8936bd78da1d0d5c9a78f30b2fdaf518 av-social-sharing-box-default  avia-builder-el-3  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Teilen<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Wie%20Schwachstellen%20in%20der%20Zugriffskontrolle%20in%20einer%20nationalen%20Krise%20endeten&#038;url=https:\/\/www.wallix.com\/de\/?p=89550' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Wie%20Schwachstellen%20in%20der%20Zugriffskontrolle%20in%20einer%20nationalen%20Krise%20endeten&#038;url=https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Wie%20Schwachstellen%20in%20der%20Zugriffskontrolle%20in%20einer%20nationalen%20Krise%20endeten&#038;body=https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a\">\n#top .hr.hr-invisible.av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a hr-invisible  avia-builder-el-4  el_after_av_social_share  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gywq38-500db124898f0973bd3150d22d62c5a2\">\n#top .av_textblock_section.av-m4gywq38-500db124898f0973bd3150d22d62c5a2 .avia_textblock{\nfont-size:19px;\ncolor:#ec6707;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gywq38-500db124898f0973bd3150d22d62c5a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p><strong><span style=\"color: black;\">Verwandte Ressourcen<\/span><\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fklsyk-47345d08b4e405405f5336633191a3ed\">\n#top .hr.hr-invisible.av-2fklsyk-47345d08b4e405405f5336633191a3ed{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2fklsyk-47345d08b4e405405f5336633191a3ed hr-invisible  avia-builder-el-6  el_after_av_textblock  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-270hzek-c67d6e37462bbc60c9a2a1241d230e0e  avia-builder-el-7  el_after_av_hr  avia-builder-el-last   avia-builder-el-7  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-89550 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-05-15T12:55:21+01:00\" >15. Mai 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/' title='Link zu: Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten'>Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-89481 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-05-15T11:52:26+01:00\" >15. Mai 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/experteninterview-nis2-und-das-neue-verantwortungsmodell-in-der-zugriffs-governance\/' title='Link zu: EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance'>EXPERTENINTERVIEW: NIS2 und das neue Verantwortungsmodell in der Zugriffs-Governance<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68335 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:27:57+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-pam-die-implementierung-von-iec-62443-ermoeglicht\/' title='Link zu: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt'>Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68309 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:45:11+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/das-entscheidende-bindeglied-iec-62443-standards-zum-schutz-industrieller-cyber-oekosysteme\/' title='Link zu: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme'>Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-64219 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-09T16:03:49+01:00\" >9. Oktober 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/gewaehrleistung-von-compliance-und-sicherheit-fuer-msps-und-ihre-kunden\/' title='Link zu: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden'>Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n<div  class='flex_column av-nok0rg-0413bcf117d44f341a48260f58b5064a av_two_third  avia-builder-el-8  el_after_av_one_third  el_before_av_two_third  first flex_column_div  column-top-margin'     ><div  class='avia-button-wrap av-mf6m6h2e-e3d10145a0f5c37f589a341fa0401c4e-wrap avia-button-center  avia-builder-el-9  avia-builder-el-no-sibling '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mf6m6h2e-e3d10145a0f5c37f589a341fa0401c4e\">\n#top #wrap_all .avia-button.av-mf6m6h2e-e3d10145a0f5c37f589a341fa0401c4e{\nfont-size:16px;\nbackground-color:#ec6707;\nborder-color:#ea6e52;\ncolor:#ffffff;\nborder-style:solid;\nborder-width:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-e3d10145a0f5c37f589a341fa0401c4e:hover{\nbackground-color:#ec6707;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-e3d10145a0f5c37f589a341fa0401c4e .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-e3d10145a0f5c37f589a341fa0401c4e:hover .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_INFOGRAPHIC_EU-Cyberattack-Case_DE.pdf'  class='avia-button av-mf6m6h2e-e3d10145a0f5c37f589a341fa0401c4e av-link-btn avia-icon_select-no avia-size-large avia-position-center'   aria-label=\"Laden Sie die Infografik als PDF herunter\"><span class='avia_iconbox_title' >Laden Sie die Infografik als PDF herunter<\/span><\/a><\/div><\/div><div  class='flex_column av-1cmx7rn-a058b0e44965034797fa52b1e3c28332 av_two_third  avia-builder-el-10  el_after_av_two_third  avia-builder-el-last  first flex_column_div  column-top-margin'     ><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":86676,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1644,2557,1641],"tags":[],"class_list":["post-89550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-audit-compliance-de","category-blog-im-fokus","category-blogpost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T11:55:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-15T12:02:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/03\/cyberattack-1030x686.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"686\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten\",\"datePublished\":\"2026-05-15T11:55:21+00:00\",\"dateModified\":\"2026-05-15T12:02:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/\"},\"wordCount\":2198,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cyberattack-scaled.jpeg\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"BLOG IM FOKUS\",\"BLOGPOST\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/\",\"name\":\"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cyberattack-scaled.jpeg\",\"datePublished\":\"2026-05-15T11:55:21+00:00\",\"dateModified\":\"2026-05-15T12:02:50+00:00\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cyberattack-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cyberattack-scaled.jpeg\",\"width\":2560,\"height\":1705},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/","og_locale":"de_DE","og_type":"article","og_title":"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten - WALLIX","og_url":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/","og_site_name":"WALLIX","article_published_time":"2026-05-15T11:55:21+00:00","article_modified_time":"2026-05-15T12:02:50+00:00","og_image":[{"width":1030,"height":686,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/03\/cyberattack-1030x686.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten","datePublished":"2026-05-15T11:55:21+00:00","dateModified":"2026-05-15T12:02:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/"},"wordCount":2198,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/03\/cyberattack-scaled.jpeg","articleSection":["AUDIT &amp; COMPLIANCE","BLOG IM FOKUS","BLOGPOST"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/","url":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/","name":"Wie Schwachstellen in der Zugriffskontrolle in einer nationalen Krise endeten - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/03\/cyberattack-scaled.jpeg","datePublished":"2026-05-15T11:55:21+00:00","dateModified":"2026-05-15T12:02:50+00:00","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/blogpost\/wie-schwachstellen-in-der-zugriffskontrolle-in-einer-nationalen-krise-endeten\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/03\/cyberattack-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/03\/cyberattack-scaled.jpeg","width":2560,"height":1705},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/89550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=89550"}],"version-history":[{"count":8,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/89550\/revisions"}],"predecessor-version":[{"id":89567,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/89550\/revisions\/89567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/86676"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=89550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=89550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=89550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}